Published in: Dagstuhl Seminar Proceedings, Volume 4411, Service Management and Self-Organization in IP-based Networks (2005)
James P.G. Sterbenz. Peer-to-Peer vs. the Internet: A Discussion on the Proper and Practical Location of Functionality. In Service Management and Self-Organization in IP-based Networks. Dagstuhl Seminar Proceedings, Volume 4411, pp. 1-10, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2005)
@InProceedings{sterbenz:DagSemProc.04411.14, author = {Sterbenz, James P.G.}, title = {{Peer-to-Peer vs. the Internet: A Discussion on the Proper and Practical Location of Functionality}}, booktitle = {Service Management and Self-Organization in IP-based Networks}, pages = {1--10}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2005}, volume = {4411}, editor = {Matthias Bossardt and Georg Carle and D. Hutchison and Hermann de Meer and Bernhard Plattner}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.04411.14}, URN = {urn:nbn:de:0030-drops-1156}, doi = {10.4230/DagSemProc.04411.14}, annote = {Keywords: network architecture , peer-to-peer , client/server , nd-to-end arguments , protocol layering , policy , ussle} }
Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)
Marc Daciér, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, and James Sterbenz. 4. 8102 Working Group – Attack Taxonomy. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{dacier_et_al:DagSemProc.08102.4, author = {Daci\'{e}r, Marc and Debar, Herv\'{e} and Holz, Thorsten and Kirda, Engin and Kohlrausch, Jan and Kruegel, Christopher and Rieck, Konrad and Sterbenz, James}, title = {{4. 8102 Working Group – Attack Taxonomy}}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense}, pages = {1--4}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {8102}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.4}, URN = {urn:nbn:de:0030-drops-14955}, doi = {10.4230/DagSemProc.08102.4}, annote = {Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation} }
Published in: Dagstuhl Seminar Proceedings, Volume 8102, Perspectives Workshop: Network Attack Detection and Defense (2008)
Lothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, and James Sterbenz. 6. 08102 Working Group – Requirements for Network Monitoring from an IDS Perspective. In Perspectives Workshop: Network Attack Detection and Defense. Dagstuhl Seminar Proceedings, Volume 8102, pp. 1-4, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{braun_et_al:DagSemProc.08102.6, author = {Braun, Lothar and Dressler, Falko and Holz, Thorsten and Kirda, Engin and Kohlrausch, Jan and Kruegel, Christopher and Limmer, Tobias and Rieck, Konrad and Sterbenz, James}, title = {{6. 08102 Working Group – Requirements for Network Monitoring from an IDS Perspective}}, booktitle = {Perspectives Workshop: Network Attack Detection and Defense}, pages = {1--4}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {8102}, editor = {Georg Carle and Falko Dressler and Richard A. Kemmerer and Hartmut K\"{o}nig and Christopher Kruegel}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.08102.6}, URN = {urn:nbn:de:0030-drops-14970}, doi = {10.4230/DagSemProc.08102.6}, annote = {Keywords: Intrusion detection and prevention, attack response and countermeasures, reactive security, automated security, survivability and self-protection, ma network monitoring, flow analysis, denial of service detection and response, event correlation} }
Feedback for Dagstuhl Publishing